- Sort Score
- Result 10 results
- Languages All
Results 81 - 90 of 210 for clusterRoles (0.24 sec)
-
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1.ClusterRole.yaml
- matchExpressions: - key: keyValue operator: operatorValue values: - valuesValue matchLabels: matchLabelsKey: matchLabelsValue apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: annotationsKey: annotationsValue creationTimestamp: "2008-01-01T01:01:01Z" deletionGracePeriodSeconds: 10 deletionTimestamp: "2009-01-01T01:01:01Z" finalizers:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 1.2K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/HEAD/rbac.authorization.k8s.io.v1.ClusterRole.json
{ "kind": "ClusterRole", "apiVersion": "rbac.authorization.k8s.io/v1", "metadata": { "name": "nameValue", "generateName": "generateNameValue", "namespace": "namespaceValue", "selfLink": "selfLinkValue", "uid": "uidValue", "resourceVersion": "resourceVersionValue", "generation": 7, "creationTimestamp": "2008-01-01T01:01:01Z", "deletionTimestamp": "2009-01-01T01:01:01Z", "deletionGracePeriodSeconds": 10,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 06 21:25:20 UTC 2022 - 1.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.8.md
* The API Server now automatically creates RBAC ClusterRoles for CSR approving. ([#49284](https://github.com/kubernetes/kubernetes/pull/49284), [@luxas](https://github.com/luxas)) * Each deployment method should bind users/groups to the ClusterRoles if they are using this feature.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 20 15:45:02 UTC 2024 - 312.2K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml
creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: cluster-admin roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:masters - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 11 19:01:47 UTC 2020 - 5.7K bytes - Viewed (0) -
releasenotes/notes/manifest-base-cleanup.yaml
| --------------------------------------- | --------------------------------------- | | `ClusterRole istiod` | `ClusterRole istiod-clusterrole` | | `ClusterRole istiod-reader` | `ClusterRole istio-reader-clusterrole` | | `ClusterRoleBinding istiod` | `ClusterRoleBinding istiod-clusterrole` | | `Role istiod` | `Role istiod` |
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jul 27 04:26:43 UTC 2023 - 1.7K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml
name: system:controller:clusterrole-aggregation-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:clusterrole-aggregation-controller subjects: - kind: ServiceAccount name: clusterrole-aggregation-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 16.9K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-roles.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: admin rules: null - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jul 18 08:11:08 UTC 2023 - 24.1K bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} subjects:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Oct 10 17:32:44 UTC 2021 - 1.3K bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Oct 10 17:32:44 UTC 2021 - 1.4K bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/reader-clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istio-reader release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jul 12 16:44:21 UTC 2021 - 589 bytes - Viewed (0)